Jump to content
xisto Community

jedipi

Members
  • Content Count

    345
  • Joined

  • Last visited

Everything posted by jedipi

  1. I am sure you guys have used Daemon. So do I. It is great. but sometime, it is hard to mount a disk image which is located in a deep directory. I found there are some way to mount disk image to Daemon more easily. Methode A: Using third party tools 1. DAEMount. It is developed by Aldo Vargas (aldo@aldostools.com) http://www.aldostools.com/daemount.html DAEMount is front-end for DAEMON Tools. You mount a disk image by double-clicking on the file icon. You select where to mount the image if you have more than one virtual drive. 2. AwxDTools ( http://forums.xisto.com/no_longer_exists/ ) This is a Daemon-Tools Shell-Extension. It adds more options to the context-menu for ImageFiles which are supported by Daemon-Tools. You can mount a image by right click on it. 3. DaemonUI ( http://www.hbreitner.de/daemonui/download.htm ) As you can see from it name, DaemonUI provides a graphical user interface for Daemon-Tools. It supports Daemon-Tools version 2.41 (or newer, but not version 4). Methode B: modify the action for ImageFile We can modify the action for ImageFile to mount it by double click or right click. I use ISO file in the following example. Step 1, open a Explorer window. then Tools-> Folder Options... ->File Types Step 2, Click the New button (if ISO file has been registered, then select it) Step 3, Click the Advanced button, give a name to this type of file Step 4, then click the New button, give a name for "Action" and use the following line for "Application used to preform action" That is it. Now you can mount your ISO file by right click on it. And use Eject for unmont. You can you above steps for your CUE, CCD etc.... Methode C: Edit windows' registry If you do not want to registor the ImageFile type one by one, try this. Copy the following line to notepad and save it as .reg file. then import it into Windows' registry. Enjoy it.
  2. It works for super DragAndGo extension version 0.24D1....I modified the install.rdf file and it works very well in Firefox 1.5The extension which you are working on sounds very cool and useful for us...I hope it can be released soon..
  3. A way to install extension that does not support version 1.5:Setp 1: download the extension that you want to install to your local drive and rename it to zip fileSetp 2: Open it with WinZip or any other compress software.Setp 3: look for install.rdf and open it with any text editor.Setp 4: Find em:maxVersion, change its value to 1.5 then saveSetp 5: Rename it back to xpi file. then install this modified extension by draging it in to a FireFox window.However, this method does not always work."SwitchProxy Tools" can be installed after modified with this method.but error occur when adding a proxy.And you can use the same method for your favorite theme.
  4. I am using it now...It is great, but eats lots of memory..I just open 3 tabs, memory usage is about 47MB.. and some extensions did not work in this 1.5 version.For example, Bookmarks Synchronizer and Super DragAndGo....
  5. Yes, you cannot uninstall Internet Protocal in Windows XP. The Uninstall button is disabled when you select Internet Protocol (TCP/IP) for a network interface. The TCP/IP is a core component of the Windows XP. It is not possible to uninstall TCP/IP in Windows XP. However, there is a reset command(in NetShell utility) is available for reset IP . This command rewrites the releavence registry keys and has the same result as removal and the reinstallation of the protocol. for more details, please visit this page https://support.microsoft.com/en-us
  6. I just want to see what people out there use.I am cheap and use Open Office as it is free and works very wellbut the interface is lacking..I used to have Apple works but it is old and out dated.iWork is too expensive. :)Office has two problems, way to expensive and M$ makes it
  7. I have been getting spam emails with Zip attachments containing .exe files all day. It's getting ridiculous. The first email said it was the FBI and my IP was logged on illegal web sites (which might be true...) but then directed me to open the zip file to see the list... I can't believe people still fall for this crap. Those who use winblows should delete this kind of email after you received. -----Merged with above-----szupie Sorry...worry quotation.... here is the correct one
  8. are you missing your classic Mac OS functionality? I do want to have the windowshade function for every window in my OS X system. The windowshade functionality that's been in the Mac OS since System 7.5 . Double-click a window's title bar, the window "rolls up" into the title bar. I found a great software from Google search. WindowShade X -- With WindowShade X, you get everything Mac OS 9 could do and more. WindowShade X has for methods, the minimize button, double-clicking the title bar, Control-double-clicking the title bar, and pressing Command-M, to roll up into the title bar. It also can make the window transparent, minimize a window to the Dock or hide the application. WindowShade X is US$10 shareware, and it's a 2.11MB download. Give it a try. http://forums.xisto.com/no_longer_exists/
  9. I voted for OpenGL as it is a open standard.It can be used in any platform.and I am learning OpenGL..
  10. security researchers in the U.K. have now published "proof of concept" code for unpatched bug in the way Microsoft Internet Explorer browser handles the JavaScript computer language. It shows how hackers could exploit the problem and possibly take over a Windows system. According to Russ Cooper, this vulnerability has been around since May. the malicious code can be launched by just one simple click on a Web link. All users of Internet Explorer version 5.5 and 6.x are affected by the vulnerability you may turn off JavaScript in Internet Explorer's Internet Options menu, or to use an alternative browser like Firefox or Opera to avoid this problem. http://forums.xisto.com/no_longer_exists/
  11. Microsoft intends to submit file formats for its new Office 12 applications to the European standards body ECMA International early next month. The document formats is called Microsoft Office Open XML. XML document formats is available in Office 2003. And in Office 12, it will save documents by default in the Open XML format. Microsoft will change the license in order to remove all the barriers for developers working with the file formats. I think that's a good news. If the document formats is Standardized, i can exchange my assignment without any worry. But, how about other openformat??? http://news.a.com.com/
  12. Google has renamed its Google Print service to Google Book Searchi. It is stated in a post on the Google's official blog. The Google Print URL (print.google.com) now redirects to books.google.com. The reason behide that is there are many users who had misconceptions that Google Print would help them print out documents and web pages. The new name just makes more sense to me and less of confusions Thus, it is better. http://forums.xisto.com/no_longer_exists/
  13. A critical vulnerability was found in some versions of Apple Computer's popular iTunes. This vulnerability could enable attackers to remotely take over a user's computer This vulnerability existed on the earlier version of iTunes 6. However, Itwas not fixd by the newest security update. iTunes 6 Windows version are affected. They are still trying to determine whether Mac OS X version affected. http://news.a.com.com/
  14. Apple is planning to release its first entry-level iBook laptops with Intel processors next January at Macworld Expo in San Francisco. A highly reliable sources have confirmed to Think Secret. However, the configuration is unknown at this moment. They may use Intel's Yonah processor for the iBooks. I hope Apple follow the trend they've started with the iPod's - a black iBook would be so sexy http://forums.xisto.com/no_longer_exists/
  15. The answer is YES and NO.Since the "adware", which come with daemon 4, is an optional package, you can may your own decision to install or not to install it. Therefore, make sure you read all screens carefully when installing.
  16. The new version of Daemon Tools, version 4, has been released. This new version of Daemon is complete redesigned from scratch with complete new emulation architecture. It support of 4 virtual drives and supports all popular copyprotections. But it is for x32 only, x64 still not not supported. we've waited a long time for x64 support. Also, an optional 'adware' based support system included in this release. Make sure you read all screens carefully when installing! Download it here: http://www.daemon-tools.cc/deu/home
  17. A vulnerability in Flash Player 7 has been identified by Macromedia. Microsoft urges users to apply a critical update from Flash Player update from Macromedia. This vulnerability affects Flash Player 7.0.19.0 and earlier. Flash Player (8.0.22.0) contains a fix for the vulnerability. If you have Flash Player 7 installed, it is the time to upgrade to this new version. It is very interesting. Microsoft is advising to upgrade an application that is not Microsoft's. But it is nice to see just how much MS is becoming dedicated with security. And the developer can make animation in Flash 8 now, and do not need to worry about backwards compatability because of we all updated from 7 to 8... haahaa source: http://www.microsoft.com/err/technet/security/
  18. You guys may heard about "RootKit" copy protection s oftware which contained in Sony-BMG CDs. Now, Electronic Frontier Foundation (EFF) is collecting stories from their members and supporters. If it is sufficiently serious, they may filing legal action. The criterias are listed on their website. Click on the source link and have a look. Source: https://www.eff.org/deeplinks/archives/004149.php
  19. UBS Investment Research analyst Ben Reitzes believes the first commercial Apple Macintosh computers running on Intel processors may be released at the Macworld Expo in early January 2006. He also said that Intelâs next-generation Pentium M flavour code-named Yonah, will be Mac Mini. Source: http://www.xbitlabs.com/news/other/display1072115033.html That's really cool if it come out earlier. when it is in store, I'd pay for it. Would you???
  20. according to the Current Analysis report, desktop computers and notebooks with AMD chips outsold Intel 49.8 percent to 48.5 percent domestic stores in the month of October. The report said AMD has done a "unthinkable" job. However, the revenue that AMD generated is still less than Intel Intel gain 57.6% in October based on revenue, while AMD lagged at 40.1%. It is because Intel's chips have a higher retail price. And Intel still the market leader in overall pc market. Source: http://news.a.com.com/ Anyway, competition is general a good thing for the consumer. Better products and lower prices! Good luck to AMD
  21. Veiwing file in Terminal You can use two utilites for viewing text files on the screen: cat and more cat is used for viewing short files (less than one page), and more is used for wiewing longer, multi-0page files. cat merely writes the file to the screen and then exites. more provides a simple interface to move backwards and forwards through a file. "f" or "Space" key to move a page forward, "Enter" key to move a line forward, "b" to move a page back and "q" to quit. if you want to just look at the beginneing or end of the file you can use the head and tail commands. Actually there is a third utility for viewing files, called less less is better than more. In fact, less is an improved version of the more program that allows more flexible scrolling and searching within the file. Too see how it works, run less words (assum there is a text file named words), Then press the "h" key for help. more is a good starting point for viewing files, but many expert user prefer less
  22. Thanks the empty calorie, You just post what i want to say, navigating the Filesystem. By now, you should be able to move any directory that you want to work in. This is the first thing that should know. Now I am going to talk about Copying, moving, renaming and deleting files. Linux/UNIX provides the cp command to copy files. When you copy a file you can name the copy anything you like, but using names which only include alphanumeric characters a-z, A-Z, 0-9is safer. cp also has options which allow you to copy groups of files and whole directories easily. Please check with man command. Moving and renaming files is done with mv command. mv is used to move one or more files between directoried or to rename a file. using mv command to move a file to the same directory with different name is know as renaming the file. rm , short for "remove", deletes files. Here are an examples, assume that there are two file, filea and fileb, in /pub directory. cd (change to your home directory)cp /pub/filea ~/filea (copy filea form /pub to your home directory)cp /pub/fileb ~/fileb (copy fileb form /pub to your home directory)ls (list files in your home directory)mkdir blah (create a directory blah in your home directory)mv filea blah (move filea to directory blah)ls (list files in your home directory)cd blah (change to blah directory)ls (list files in blah directory)cd .. (change to upper directory, your home directory)mv fileb filec (rename fileb to filec)ls (list files in your home directory)rm filec (delet filec)
  23. I think you need to understand the Linux file system first.. The Linux/UNIX filesystem is made up mainly of two types of files - normal files and directories. "Normal" files include programs, text, imanges, etc. Directories are files which can contain other files, including other directories. Their use is for organising files. If you are familiar with Microsoft Windows, a directory on UNIX/Linux is the same thing as a "folder" in Windows terminology. When you open a terminals, your initial position in filesystem is your home directory. Try to type pwd and press enter. (pwd -- Print Working Directory) The output of pwd is the pathname of your current directory. e.g. /home/sinx as you can see, the directory names are separated by forward slash, /. This is different from MS-DOS which uses the backslash, "\". The root directory is "/". All files and directories in the filesystem are located underneath the root directory. That's why all full pathnames will start with "/". You can list the files in your current directory using the ls (list) command. there are some opthins you may specify for ls command: -l (LONG listing-show all file details) -a (ALL files, including files starting with "." that are normally hidden) -t (Sort by TIME last modified) -R (RECURSIVE listing -show contents of subdirectoryes as well) After this, I think you will understand the filesystem is hierarchically structured. Next step is to know how to navigating the Filesystem. I will post something about that later.
  24. That's a great news..Version 5.0 is the most ambitious release to date for MySQL ABMySQL is not a toy any more. It is an Enterprise class product now with those new features.HP and IBM are supporters as well....it may change how MySQL is perceived in the market.If you've been waiting for any of those features, give MySQL 5.0 a try
  25. jedipi

    Lsass Virus?

    lsass.exe also relates to the Windang.worm, irc.ratsou.b, Webus.B, MyDoom.L, Randex.AR and Nimos.wormThose worm can be spreaded via floppy disk drives, mass-mailing and peer-to-peer sharing. You better install Microsoft Security Bulletin MS04-011 if you have installed it yet.Inaddition, I recommend you use a firewall. Or you can just simplely turneon the Internet Connection Firewall included in Windows XP.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.